Hiding Sensitive Knowledge by Applying Randomly Changing Algorithm

Data mining mechanisms have widely been applied in various businesses and manufacturing companies across many industry sectors. Sharing data or sharing mined rules has become a trend among business partnerships. This has also increased the risk of unexpected information leaks when releasing data. To conceal restrictive itemsets (patterns) contained in the source database, a sanitization process is needed to transform the source database into a released database. The transformed result should also conceal non-restrictive information as an unwanted event.